• Title/Summary/Keyword: 사용자플랫폼

Search Result 2,055, Processing Time 0.028 seconds

Utilization of UCC in Convergence Era (컨버전스시대 UCC의 활용)

  • Lyou, Chul-Gyun;Park, Na-Young
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.6
    • /
    • pp.89-98
    • /
    • 2007
  • UCC(User Created Content) is attracted public attention in the era of web2.0 that users create, distribute and consume various kinds of media content through a web platform standing on participation, collaboration and openness. As most discussion about UCC is centered on making benefit using it, it is understood as 'the information commodity' which is appropriated to new media environment. But UCC have to be understood not only as the information commodity but as 'the state of media'. UCC can be classified into two types based on desire for transparency and opaqueness from the media's genealogical point of view which is the logic of 'remediation' that J.Bolter and R.Grusin suggested. In the convergence era that a lot of new media appear, for example IPTV and DMB, this study devise a method of the utilization of UCC from diverse aspects of remediation in the paradigm of convergence.

A Study on the Usability of University Remote Lecture -Focusing on Zoom and Webex Meetings- (대학 원격강의 프로그램의 사용성 연구 -Zoom과 Webex Meetings를 중심으로-)

  • Shin, Jun;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.403-408
    • /
    • 2020
  • This paper is to evaluate the usability of two representative video meeting services currently used by university for research to improve the quality of university remote lecture. questionnaires based on Kano Model were designed and in-depth interviews were conducted to provide qualitative approaches. Screen-sharing functions, the one-dimensional functions was the most important function. and attractive functions had relatively diverse directions. For essential functions, there was a wide gap in quality due to user-specific equipment. The function in which other platforms exist or business-related was not important. Webex reacted negatively to the aging UI, while Zoom responded negatively to the unilateral mute function. In addition, the development direction was presented in five ways as a result of analysis of these results. under Corona-19 situation, I hope this study will lead to continuous research to make stepping stone for remoted educational development.

Development of Search Method using Semantic technologies about RESTful Web Services (시맨틱 기술을 활용한 RESTful 웹서비스의 검색 기법 개발)

  • Cha, Seung-Jun;Choi, Yun-Jeong;Lee, Kyu-Chul
    • Journal of Korea Spatial Information System Society
    • /
    • v.12 no.1
    • /
    • pp.100-104
    • /
    • 2010
  • Recently with advent of Web 2.0, RESTful Web Services are becoming increasing trend to emphasize Web as platform. There are already many services and the number of service increases in very fast pace. So it is difficult to find the service what we want by keyword based search. To solve this problem, we developed the search method using sem antic technologies about RESTful Web Services. For that, first we define the system structure and model the description format based on the integrated search system for OpenAPIs, and then we add Semantic Markup (tagging, semantic annotation) on the HTML description pages. Next we extract RDF document from them and store it in service repository. Based on the keywords that are extended by means of ontology, the developed system provides more purified and extended results than similarity-based keyword searching system.

A Lightweight Key Management for Wireless LANs with the Fast Re-authentication (무선 랜에서 빠른 재 인증을 이용한 간소화된 키 관리 기법)

  • Lee Jae-Hyoung;Kim Tae-Hyong;Han Kyu-Phil;Kim Young-Hak
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.327-338
    • /
    • 2005
  • Since the IEEE 802.11 wireless LANs were known to have several critical weaknesses in the aspect of security, a lot of works have been done to reduce such weaknesses of the wireless LAN security, Among them IEEE 802.lli may be the ultimate long-term solution that requires new security platform with new wireless LAM products. However, it might not be the best solution for small organizations due to its high cost where the cost is a critical issue. This paper proposes FR-WEP, a light-weight key management for wireless LANs that can be used with small changes of the existing Products. FR-WEP is an extension to a lightweight key management, WEP'(9), which was proposed lately. It makes up for the weak points of WEP' by providing lightweight mutual authentication with both host keys and user keys, and seamless key-refresh for authenticated users with fast re-authentication. It would be a good alternative to the heavy standards for wireless LAN security, especially to small organizations hoping for better security.

The design and implementation of Object-based bioimage matching on a Mobile Device (모바일 장치기반의 바이오 객체 이미지 매칭 시스템 설계 및 구현)

  • Park, Chanil;Moon, Seung-jin
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.1-10
    • /
    • 2019
  • Object-based image matching algorithms have been widely used in the image processing and computer vision fields. A variety of applications based on image matching algorithms have been recently developed for object recognition, 3D modeling, video tracking, and biomedical informatics. One prominent example of image matching features is the Scale Invariant Feature Transform (SIFT) scheme. However many applications using the SIFT algorithm have implemented based on stand-alone basis, not client-server architecture. In this paper, We initially implemented based on client-server structure by using SIFT algorithms to identify and match objects in biomedical images to provide useful information to the user based on the recently released Mobile platform. The major methodological contribution of this work is leveraging the convenient user interface and ubiquitous Internet connection on Mobile device for interactive delineation, segmentation, representation, matching and retrieval of biomedical images. With these technologies, our paper showcased examples of performing reliable image matching from different views of an object in the applications of semantic image search for biomedical informatics.

A Efficient Debugging Method for Java Programs (자바 프로그램을 위한 효율적인 디버깅 방법)

  • 고훈준;유원희
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.170-176
    • /
    • 2002
  • Java language is a representative object-oriented language that is used at the various platform and fields. A structure of java language is simpler than traditional procedural-oriented language because of characters of object-oriented language But it is difficult to debug complicated java programs. Debugging has always been a costly part of software development. Syntax errors of java programs is easily found by the current debugging system. But it is difficult to locate logical errors included in java programs. Traditional debugging techniques locating logical errors in java program have been still used with conventional methods that are used at procedural-oriented languages. Unfortunately, these traditional methods are often inadequate for the task of isolating specific program errors. Debugger users may spend considerable time debugging code of program development with sequential methods according as program size is large and is complicated. It is important to easily locate errors included in java program in the software development. In this paper, we apply algorithmic debugging method that debugger user can easily debug programs to java program. This method executes a program and makes an execution tree from calling relation of functions. And it locates errors at the execution tree. So, Algorithmic debugging method can reduce the number of debugging than conventional sequential method.

  • PDF

A Study of Flow-based QoS Management in Packet Transport Network (패킷 전송망에서의 플로우 기반 QoS 관리 방안 연구)

  • Choi, Chang-Ho;Kim, Whan-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.11
    • /
    • pp.73-82
    • /
    • 2011
  • As a demand of IP based packet service is increasing, transport network is evolving from circuit based transport technology using TDM to Ethernet based packet transport technology. In this paper we introduce packet transport network based on PBB-TE and MPLS-TP and propose a quality of service(QoS) management scheme to satisfy various user requirements in packet transport network. The proposed flow-based QoS management scheme guarantees that per-flow bandwidth control satisfies the predefined QoS requirement perfectly under bandwidth congestion condition by using perflow and per-PTL tunnel management. In order to evaluate the proposed scheme we defined flow and PTL tunnel per input frame and configured QoS parameters for each flow and PTL tunnel respectively. Simulation was done by using OPNET modeler 16.0 version.

A System of Authentication and Security threat solution for N-screen services (N-스크린을 위한 인증 및 보안 위협 해결 시스템)

  • Hwang, Deuk-Young;Moon, Jeong-Kyung;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.775-781
    • /
    • 2013
  • N-screen is a Service that can be provide for One Service Multi Device. If the network is changed or if the device is changed after authentication the device fits seamlessly send footage. Security threats that occur here have a problem with user authentication. In this paper proposes available in a multi-device the authentication system. Homomorphic Encryption Algorithm of authentication scheme used. Among the authentication mechanism that already exists is a simple and lightweight authentication mechanism. In addition, N-screen service that uses multiple devices is simple authentication process of the device. Review the results of proposed authentication protocol, encryption algorithm to process a small storage capacity and is easy to work in low processor. And was suitable for use with multiple devices.

The Effect of Self-Disclosure on the Intention to Use of SNS in the Digital Convergence Environment (디지털 융복합 환경에서 자기노출이 SNS 사용 의도에 미치는 영향)

  • Cho, Yong-Kil
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.139-150
    • /
    • 2015
  • Social Network Service is one of platforms rapidly growing in the environment of digital convergence. Most of researches regarding social network service(SNS) done up to the present time are concerning about technic and effectiveness characteristics of SNS. However, this study focuses on the roll of self-disclosure in the use of social network services(SNS). From the perspectives of personal and social motivation rather than the effectiveness and technic characteristics of SNS. the relations among self-disclosure, enjoyment, social ties and intention to use have been tested empirically. The results from this study shows that self-disclosure has not directly effects on the intention to use of SNS, but indirectly effects on it through personal enjoyment and desire to have social ties.

Device Objectification and Orchestration Mechanism for IoT Intelligent Service (IoT 서비스 지능화를 위한 디바이스 오브젝트화 및 오케스트레이션 메커니즘)

  • Kim, Youngjun;Jeon, Yongkeun;Chong, Ilyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.19-32
    • /
    • 2013
  • This paper suggests smart gateway structure and functionalities that provide device web service which can be used by user using objectified devices. The smart gateway objectify a physical device in other to provide the device web service in IoT intelligent service. And the paper suggests a mechanism that provide orchestrated service of various devices to user using a concept of service overlay network. and also suggests a interface that provide device web services and the orchestrated service between the smart gateway and a web service platform. In the paper, the objectified devices can be combined with web service objects and device contexts based on the service overlay network, furthermore the objectified devices can provide intelligence and dynamic service in the IoT environment.